Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
86bf5815802aee76cd5d2fbe6ca3a755_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86bf5815802aee76cd5d2fbe6ca3a755_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
86bf5815802aee76cd5d2fbe6ca3a755_JaffaCakes118.html
-
Size
27KB
-
MD5
86bf5815802aee76cd5d2fbe6ca3a755
-
SHA1
c03922e6aca369cb02c3386075e1c3ea7ea6fc37
-
SHA256
1b7e9b8fc0958d0259b3127018acebe959f78d4230c5bdff819b84f42bb865c2
-
SHA512
ef6e9b89d2930f8460d76e438d3c4960e320ced6d18ae7065c367d157a2baf27f5ae1555d22e0c9b67ab91c456d95891f9b0373c72dd27fbde02c50a41e0f91c
-
SSDEEP
192:uwzAb5nZWnQjxn5Q/0nQienNnTnQOkEntoanQTbnxnQ9en3m6PXp/Ql7MBHqnYn2:AQ/rupvp+SRyD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423314585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCE814E1-1F3B-11EF-8356-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86bf5815802aee76cd5d2fbe6ca3a755_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d1a3cd1622e3b959ce2965a6bfbb07
SHA1a14aa325909d78bd8f32ba4a059a0351cd50eeb0
SHA2562d1d67409b8ff67589e1589b43294b46190ba05c61a7841bdedfdeca875f351f
SHA51278690de3526a6a1cc0ff04a746359a99f6745211207475a7912d547971f5b4c1d6dd0e8bb4679cab986970b7753942a16a3a07a983de0c0b4a36edcca1d94ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064141cc18f6d5674438e2766a3b1b7c
SHA1edc6c1ba7825feeaee2d438dd15b9343f462a82a
SHA256e037ce9712ca655da0746f1696b5294714ffc4b1f9edc1707c9dfd039a97355a
SHA512f3642f09049bc0acfa439fd317993ac86b9b130ed19276c1a2465da7cb74b168db5294e208718e2f79399391921809455f6c1c74eb7dac7c01b01c817427772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827c530ef89d8e410ba586adb71e0a09
SHA179a2e1e4bebf7fd0261637cb936405f32d47b388
SHA256c342d76b6183d01af885a8a152a8013cf81045423137d07b1f65c254c413b25f
SHA512f5348dd46d83b1ee581323c1e23acd9469c2143192e0f8717ce3fd8fd4b4db05c7e38517736f271a39d0a37e31af1703f618d43a68e81f0955875c03efe20628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2d6ff6c6a2d22dea0af626ef698671
SHA17a35eec3c9c5e6e80ab6f21b68839f7ce82ac65f
SHA256bab909e55970b9fcfe45672f4835c527ffa3fdc44f4f4e151a385a63373229c3
SHA512cef289e03f43e9df09c5ebda786312392eb09ce3ba65905823eb8d80717fdd4fdd85df51edb10ba1b6556268a89e288c77fe11fffce55aa325c94fade8a25d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7c36351e2a94ab76573ad95e754286
SHA1d1a7c9951f8e2274059b5555cc2ae246902466e7
SHA2567589ea8c9e9dd804498180a16d40263e312a75798bbb3d5e556d94b2e369e2b5
SHA512c9993e9ed7c5892233202f1301bac95f223168f8f107d8be3ffcde9b8b144ae52e34c604d8a97d16463a793740f5702881041f6e4d7ec6463dfb876b22945251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee854ddb142f63756ac3344cc60af00
SHA11aa0843417d09bc981c085a9d88a12c579e63621
SHA256772d57a18bf98a5436a7890caa4ad9ee56bca07587350f86cb3290aab2c65e30
SHA5125c02ce8df9f9ba0d6bca8018ac97f1554073f494bcb13d9961dfa1ccd37ae26843681b6d02f129ddc6c62d03ba1bff9e54d3577f6556151b37f57e113cd412d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508af3dc78eb8dc88ebf8f5cd18694e9e
SHA16056966b6fb80fcb19dad31ae0c34f224aa08481
SHA25637cfcd9e3ab64cc10f44b05e09d24747eb830d5a6c92304fe64d83cdcfdc820b
SHA5124905f181b0b61283a7e8f237a822efe1de0af9d13347b7f090240ac4738c30029abd1e663cfe6fa98b5347e002cbee63c499ada950c4ce8217f7fc8da1638a48
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b